Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy (Laser Photonics Rev. 18(6)/2024)
COMPUTATIONAL IMAGING FOR SECURE AUTHENTICATION AND ENCRYPTION This pioneering approach merges Fourier ghost imaging, deep learning, and computational holography to improve data access control and reinforce physical security measures. The integration of these advanced techniques demonstrates the pot...
Gespeichert in:
Veröffentlicht in: | Laser & photonics reviews 2024-06, Vol.18 (6), p.n/a |
---|---|
Hauptverfasser: | , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | n/a |
---|---|
container_issue | 6 |
container_start_page | |
container_title | Laser & photonics reviews |
container_volume | 18 |
creator | Wang, Xiaogang Zhou, Qingming Zhang, Lin Xue, Jidong Xu, Bijun Yu, Xinning Wang, Sheng Zhang, Zhenyu |
description | COMPUTATIONAL IMAGING FOR SECURE AUTHENTICATION AND ENCRYPTION
This pioneering approach merges Fourier ghost imaging, deep learning, and computational holography to improve data access control and reinforce physical security measures. The integration of these advanced techniques demonstrates the potential impact of computational imaging in advancing security protocols, as outlined by Xiaogang Wang and co‐workers in article 2300820. |
doi_str_mv | 10.1002/lpor.202470037 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3065661548</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3065661548</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1577-4a03c790c2cdeec08182c2de18ba49045839c035c08c01257bf7239c559aa6733</originalsourceid><addsrcrecordid>eNqFUM9PwjAUbowmInr13MQLHDZet3XrjoSgkCyBoJ6XUspWMtbZbpLd_NPdxODRd3m_vu_Lex9CjwRcAuBNikob1wMviAD86AoNCAt9h7E4vr7UDG7RnbUHANpFOEBfM32smprXSpe8wMsjz1SZ4XkpTFv1Q3xSdY45fq1lxkudGV7lSmBe7vBCF5d-2tS5LGslfpQ6tOEdocWjhFtp8DrXtS6VsHgjP11M2CgcT_pbx_foZs8LKx9-8xC9P8_fZgsnWb0sZ9PEEYRGkRNw8EUUg_DETkoBjDBPeDtJ2JYHMQSU-bEAn3YbAcSj0XYfed2I0pjzMPL9IXo661ZGfzTS1ulBN6b72aY-hDQMCQ1Yh3LPKGG0tUbu08qoIzdtSiDtXU57l9OLyx0hPhNOqpDtP-g0Wa82f9xv4faAvg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3065661548</pqid></control><display><type>article</type><title>Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy (Laser Photonics Rev. 18(6)/2024)</title><source>Wiley Online Library Journals Frontfile Complete</source><creator>Wang, Xiaogang ; Zhou, Qingming ; Zhang, Lin ; Xue, Jidong ; Xu, Bijun ; Yu, Xinning ; Wang, Sheng ; Zhang, Zhenyu</creator><creatorcontrib>Wang, Xiaogang ; Zhou, Qingming ; Zhang, Lin ; Xue, Jidong ; Xu, Bijun ; Yu, Xinning ; Wang, Sheng ; Zhang, Zhenyu</creatorcontrib><description>COMPUTATIONAL IMAGING FOR SECURE AUTHENTICATION AND ENCRYPTION
This pioneering approach merges Fourier ghost imaging, deep learning, and computational holography to improve data access control and reinforce physical security measures. The integration of these advanced techniques demonstrates the potential impact of computational imaging in advancing security protocols, as outlined by Xiaogang Wang and co‐workers in article 2300820.</description><identifier>ISSN: 1863-8880</identifier><identifier>EISSN: 1863-8899</identifier><identifier>DOI: 10.1002/lpor.202470037</identifier><language>eng</language><publisher>Weinheim: Wiley Subscription Services, Inc</publisher><subject>Access control ; Authentication ; Holography ; Imaging ; Security ; Steganography</subject><ispartof>Laser & photonics reviews, 2024-06, Vol.18 (6), p.n/a</ispartof><rights>2024 Wiley‐VCH GmbH</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Flpor.202470037$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Flpor.202470037$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,777,781,1412,27905,27906,45555,45556</link.rule.ids></links><search><creatorcontrib>Wang, Xiaogang</creatorcontrib><creatorcontrib>Zhou, Qingming</creatorcontrib><creatorcontrib>Zhang, Lin</creatorcontrib><creatorcontrib>Xue, Jidong</creatorcontrib><creatorcontrib>Xu, Bijun</creatorcontrib><creatorcontrib>Yu, Xinning</creatorcontrib><creatorcontrib>Wang, Sheng</creatorcontrib><creatorcontrib>Zhang, Zhenyu</creatorcontrib><title>Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy (Laser Photonics Rev. 18(6)/2024)</title><title>Laser & photonics reviews</title><description>COMPUTATIONAL IMAGING FOR SECURE AUTHENTICATION AND ENCRYPTION
This pioneering approach merges Fourier ghost imaging, deep learning, and computational holography to improve data access control and reinforce physical security measures. The integration of these advanced techniques demonstrates the potential impact of computational imaging in advancing security protocols, as outlined by Xiaogang Wang and co‐workers in article 2300820.</description><subject>Access control</subject><subject>Authentication</subject><subject>Holography</subject><subject>Imaging</subject><subject>Security</subject><subject>Steganography</subject><issn>1863-8880</issn><issn>1863-8899</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNqFUM9PwjAUbowmInr13MQLHDZet3XrjoSgkCyBoJ6XUspWMtbZbpLd_NPdxODRd3m_vu_Lex9CjwRcAuBNikob1wMviAD86AoNCAt9h7E4vr7UDG7RnbUHANpFOEBfM32smprXSpe8wMsjz1SZ4XkpTFv1Q3xSdY45fq1lxkudGV7lSmBe7vBCF5d-2tS5LGslfpQ6tOEdocWjhFtp8DrXtS6VsHgjP11M2CgcT_pbx_foZs8LKx9-8xC9P8_fZgsnWb0sZ9PEEYRGkRNw8EUUg_DETkoBjDBPeDtJ2JYHMQSU-bEAn3YbAcSj0XYfed2I0pjzMPL9IXo661ZGfzTS1ulBN6b72aY-hDQMCQ1Yh3LPKGG0tUbu08qoIzdtSiDtXU57l9OLyx0hPhNOqpDtP-g0Wa82f9xv4faAvg</recordid><startdate>202406</startdate><enddate>202406</enddate><creator>Wang, Xiaogang</creator><creator>Zhou, Qingming</creator><creator>Zhang, Lin</creator><creator>Xue, Jidong</creator><creator>Xu, Bijun</creator><creator>Yu, Xinning</creator><creator>Wang, Sheng</creator><creator>Zhang, Zhenyu</creator><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7U5</scope><scope>8FD</scope><scope>L7M</scope></search><sort><creationdate>202406</creationdate><title>Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy (Laser Photonics Rev. 18(6)/2024)</title><author>Wang, Xiaogang ; Zhou, Qingming ; Zhang, Lin ; Xue, Jidong ; Xu, Bijun ; Yu, Xinning ; Wang, Sheng ; Zhang, Zhenyu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1577-4a03c790c2cdeec08182c2de18ba49045839c035c08c01257bf7239c559aa6733</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Access control</topic><topic>Authentication</topic><topic>Holography</topic><topic>Imaging</topic><topic>Security</topic><topic>Steganography</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Xiaogang</creatorcontrib><creatorcontrib>Zhou, Qingming</creatorcontrib><creatorcontrib>Zhang, Lin</creatorcontrib><creatorcontrib>Xue, Jidong</creatorcontrib><creatorcontrib>Xu, Bijun</creatorcontrib><creatorcontrib>Yu, Xinning</creatorcontrib><creatorcontrib>Wang, Sheng</creatorcontrib><creatorcontrib>Zhang, Zhenyu</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Laser & photonics reviews</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Xiaogang</au><au>Zhou, Qingming</au><au>Zhang, Lin</au><au>Xue, Jidong</au><au>Xu, Bijun</au><au>Yu, Xinning</au><au>Wang, Sheng</au><au>Zhang, Zhenyu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy (Laser Photonics Rev. 18(6)/2024)</atitle><jtitle>Laser & photonics reviews</jtitle><date>2024-06</date><risdate>2024</risdate><volume>18</volume><issue>6</issue><epage>n/a</epage><issn>1863-8880</issn><eissn>1863-8899</eissn><abstract>COMPUTATIONAL IMAGING FOR SECURE AUTHENTICATION AND ENCRYPTION
This pioneering approach merges Fourier ghost imaging, deep learning, and computational holography to improve data access control and reinforce physical security measures. The integration of these advanced techniques demonstrates the potential impact of computational imaging in advancing security protocols, as outlined by Xiaogang Wang and co‐workers in article 2300820.</abstract><cop>Weinheim</cop><pub>Wiley Subscription Services, Inc</pub><doi>10.1002/lpor.202470037</doi><tpages>1</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1863-8880 |
ispartof | Laser & photonics reviews, 2024-06, Vol.18 (6), p.n/a |
issn | 1863-8880 1863-8899 |
language | eng |
recordid | cdi_proquest_journals_3065661548 |
source | Wiley Online Library Journals Frontfile Complete |
subjects | Access control Authentication Holography Imaging Security Steganography |
title | Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy (Laser Photonics Rev. 18(6)/2024) |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T19%3A54%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Computational%20Imaging%20Encryption%20with%20a%20Steganographic%20and%20Holographic%20Authentication%20Strategy%20(Laser%20Photonics%20Rev.%2018(6)/2024)&rft.jtitle=Laser%20&%20photonics%20reviews&rft.au=Wang,%20Xiaogang&rft.date=2024-06&rft.volume=18&rft.issue=6&rft.epage=n/a&rft.issn=1863-8880&rft.eissn=1863-8899&rft_id=info:doi/10.1002/lpor.202470037&rft_dat=%3Cproquest_cross%3E3065661548%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3065661548&rft_id=info:pmid/&rfr_iscdi=true |